CVE-2025-62618
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-10-31

Last updated on: 2025-11-10

Assigner: Cybersecurity and Infrastructure Security Agency (CISA) U.S. Civilian Government

Description
ELOG allows an authenticated user to upload arbitrary HTML files. The HTML content is executed in the context of other users when they open the file. Because ELOG includes usernames and password hashes in certain HTTP requests, an attacker can obtain the target's credentials and replay them or crack the password hash offline. In ELOG 3.1.5-20251014 release, HTML files are rendered as plain text.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-10-31
Last Modified
2025-11-10
Generated
2026-05-07
AI Q&A
2025-11-01
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
elog_project elog to 3.1.5-20251014 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-434 The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
CWE-836 The product records password hashes in a data store, receives a hash of a password from a client, and compares the supplied hash to the hash obtained from the data store.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-62618 is a stored cross-site scripting (XSS) vulnerability in the Electronic Logbook (ELOG) software. Authenticated users can upload arbitrary HTML files that are executed in the context of other users when they open these files. This allows attackers to steal usernames and password hashes included in certain HTTP requests, which can then be used to replay credentials or crack passwords offline. The vulnerability is fixed in ELOG version 3.1.5-20251014 by rendering uploaded HTML files as plain text, preventing script execution. [3]


How can this vulnerability impact me? :

This vulnerability can lead to credential theft by allowing attackers to execute malicious HTML/JavaScript in other users' browsers. Attackers can capture usernames and password hashes, potentially gaining unauthorized access to user accounts through replay attacks or offline password cracking. This compromises confidentiality, integrity, and availability of the system and user data. [3]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

Detection can involve monitoring for uploaded HTML files in ELOG by authenticated users, as these files may contain malicious scripts. Additionally, inspecting HTTP requests for usernames and password hashes being transmitted can indicate exploitation attempts. Specific commands are not provided in the resources, but checking ELOG upload directories for HTML files and analyzing HTTP traffic for suspicious requests related to ELOG would be advisable. [3]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include upgrading ELOG to version 3.1.5-20251014 or later, where uploaded HTML files are rendered as plain text, preventing script execution. Additionally, it is advised not to run ELOG with self-registration or the execute facility enabled to reduce risk. [3]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart